Está en la página 1de 12

CONFIDENTIAL

CS/SEP 2010/CSC133/134

<^m>
UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION

COURSE COURSE CODE EXAMINATION TIME

COMPUTER AND INFORMATION PROCESSING CSC133/134 SEPTEMBER 2010 2 HOURS

INSTRUCTIONS TO CANDIDATES 1. This question paper consists of three (3) parts : PART A (40 Questions) PART B (9 Questions) PART C (3 Questions) Answer ALL questions from PART A and PART B, and ONLY TWO (2) questions from PART C. i) ii) Answer PART A in the Objective Answer Sheet. Answer PART B and PART C in the Answer Booklet. Start each answer on a new page.

2.

3.

Do not bring any material into the examination room unless permission is given by the invigilator. Please check to make sure that this examination pack consists of: i) ii) iii) the Question Paper an Answer Booklet - provided by the Faculty an Objective Answer Sheet - provided by the Faculty

4.

DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO DO SO


This examination paper consists of 12 printed pages
Hak Cipta Universiti Teknologi MARA CONFIDENTIAL

CONFIDENTIAL PART A (40 MARKS) Answer ALL questions 1. video. A. B. C. D. data information process program

CS/SEP 2010/CSC133/134

is a collection of unprocessed items, such as text, numbers, images, audio and

2. The series of input, process, output, and storage sometimes is referred as A. B. C. D. Computer programming Information processing Data entering Web browsing

3. Which of the following is an example of connectivity? A. B. C. D. power cord storage Internet data

4. The electronic component in system unit that controls and manipulates data in order to produce information is called the . A. B. C. D. port central processing unit memory chip

Question 5, 6 and 7 refer to the following Figure 1. ittp://www.uitm.edu.my/uitm/index.php

Figure 1

5. Figure 1 is the example of _ A. B. C. D. domain name uniform resource locator internet protocol domain code

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

3 .

CS/SEP 2010/CSC133/134

6. The word edu in Figure 1 is referred as A. B. C. D. domain name uniform resource locator internet protocol domain code .

7. X in Figure 1 is referred as A. B. C. D. domain name uniform resource locator communications protocol domain code

8. Instant messaging (IM) is a(n)

A. programs that use a variety of different approaches to identify and eliminate spam. B. form of real-time communication that allows two or more people to contact each other. C. group of e-mail names and addresses given in single name. D. internet standard that permits the process of file uploading and downloading with other computer. 9. A (n) A. B. C. D. 10. web browser ISP URL is a program that provides access to Web resources.

electronic commerce occurs when one individuals sells directly to another individuals such as online auction. A. B. C. D. business to business business to consumer consumer to consumer customer to customer .

11. Application software is available in several forms such as A. B. C. D. Packaged software Freeware Open source software All the above .

12. Mac OS X is an example of a (an) A. B. C. D. application software operating system utility program browser

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/SEP 2010/CSC133/134

13. What are the correct steps to develop a multimedia presentation? i. ii. iii. iv. A. B. C. D. Design Support Plan and Analyze Create i, ii, iii, iv iii, i, iv, ii i, iii, iv, ii iii, i, ii, iv .

14. The binary coding scheme that uses16 - bit code in the computer is A. B. C. D. ASCII Unicode EBCDIC No available answer

15. "Each row, called a , contains data about a given person, product, object, or event and each column, called a , contains specific category of data within the record". A. B. C. D. database, field field, record record, field record, database

16. A is a collection of separate application software of related functionality bundled together and sold as a group. A. B. C. D. programs software suite integrated packages software collections

17. What contaminant on hard disk surface could cause a head crash and make the hard disk unusable? A. B. C. D. A hair Dust Smoke All of the above is typically used to upload and download files with other computers on

18. A(n) the Internet. A. B. C. D.

FTP Software Browser Email software Application Software


CONFIDENTIAL

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CS/SEP 2010/CSC133/134

19. The system board is also known as A. B. C. D. motherboard system unit central processing unit No available answer

20. Below are examples of stand-alone and network operating systems, EXCEPT A. B. C. D. Windows Vista Solaris Windows NT Windows CE

21. "This Y bus is part of motherboard and used to connect the processor or CPU to main memory". The Y bus is referring to . A. B. C. D. I/O bus System bus Expansion bus No available answer is the link from satellite down to one or

22. In satellite telecommunication, a more ground stations or receivers. A. B. C. D. download downlink down satellite No available answer

23. The term "programmer" is used to describe people who A. B. C. D. write software for computer. last to use a computer or the information from the computer. repair the computer. no available answer. .

24. Real-time processing is also known as A. B. C. D. online processing data collector database file .

25. CASE stands for A. B. C. D.

computer aided software engineering computer apple software equal computer admin soft enough no available answer CONFIDENTIAL

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CS/SEP 2010/CSC133/134

26. Media Player is able to do the following fuctions EXCEPT A. B. C. D. Allowing user to view images and animations Allowing user to listen to audio and watch video files on computer Capable to organize media files Writing text, graphics, audio and video files on a recordable or rewriteable CD and DVD

27. This printer can generate images by pushing heated ink against heat-sensitive paper. The basic type of this printer is inexpensive, but the print quality is low and the images tend to fade over time. The statements best describe a(an) . A. B. C. D. Ink-jet printer Laser printer Thermal printer Dot-matrix printer

28. User used this software to create and manipulate documents containing mostly text and sometimes graphics. Million of people used this software to develop document such as reports, news letter and web pages. This software is referred to . A. B. C. D. 29. A. B. C. D. Reading Writing Printing Caching drive. spreadsheet software note taking software web authoring software word processing software is the process of accessing file from the disk.

30. The internal floppy disk is typically referred to as the A. B. C. D. 31. A. B. C. D. A B C Main use satellite to determine geographic locations. TCP/IP OSI GPS NOS

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/SEP 2010/CSC133/134

32. The ethical issue that relates to the responsibility of those who collect data to ensure that the data is correct is known as . A. B. C. D. privacy accuracy property access

33. Which of the following best describe Encryption? A. code all the message that send over the network B. limit access to authorized person using such measures as password, dial-back system, and firewalls C. prepare for disaster by ensuring physical security and data security through a disaster recovery plan D. routinely copy data and store it at a remote location 34. Communications software consists of programs that do all the following EXCEPT A. B. C. D. Help user establish a connection to another computer or network Manage the transmissions of data, instructions and information Provide interface to the users to communicate with one another Convert a computer's analog signal into digital signals for transmission

35. To convert the entire source program such as C++ into a machine language, programmers can use a program called a (an) . A. B. C. D. debugger assembler compiler interpreter

36. Checklist, grid charts, decision table, and system flowcharts are part of the phase. A. B. C. D. analysis design preliminary investigation development

37. Which of the following is NOT an optical storage media? A. B. C. D. CD HD-DVD DVD Hard disks

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/SEP 2010/CSC133/134

38. Many businesses networked their computers together to A. B. C. D. facilitate communication share hardware, software, data and information transfer funds all the above

39. The A. B. C. D.

manages and controls the budget and schedule of a project.

Project team System developer Project leader Steering committee is a notice that guarantees a user or website is legitimate.

40. A (An) A. B. C. D.

Trusted source Digital certificate Surge protector End-user license agreement

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

CS/SEP

PART B (30 MARKS) Answer ALL questions

QUESTION 1 What is a computer? Define computer literacy. (2 marks)

QUESTION 2 List FOUR (4) elements in an URL. (4 marks)

QUESTION 3 List THREE (3) basic components in an e-mail message. (3 marks)

QUESTION 4 Briefly describe the following terms: a) b) c) Netiquette Spoofing Object embedded (3 marks)

QUESTION 5 List THREE (3) areas of Artificial Intelligence. (3 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL QUESTION 6

10

CS/SEP 2010/CSC133/134

Give TWO (2) reasons why computer systems required maintenance? (4 marks)

QUESTION 7 What is the main difference between primary storage and secondary storage? (4 marks)

QUESTION 8 List THREE (3) types of scanning devices. (3 marks)

QUESTION 9 List FOUR (4) categories of Application Software. (4 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL

11

CS/SEP 2010/CSC133/134

PART C (30 MARKS) Answer any TWO (2) questions.

QUESTION 1 Without proper software, a computer is a useless tool. Software allows users to accomplish different types of tasks. a) Define software. Briefly describe the TWO (2) main categories of software. (6 marks) b) Describe some advantages of word processing software over the old-fashioned typewriter. (6 marks) c) Give THREE (3) examples of utility programs. (3 marks)

QUESTION 2 Information system supports different levels of operations and management of an organization. a) Sketch out the pyramids of operations and managements supported by information systems. (4 marks)

b) List THREE (3) types of reports generated from Transaction Processing System (TPS). (3 marks)

c) Give FOUR (4) benefits of using information system. (8 marks)

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

CONFIDENTIAL QUESTION 3

12

CS/SEP 2010/CSC133/134

There are two categories of transmission media in communication, namely the physical connection and wireless connection. a) Explain the differences between the physical transmission media and wireless transmission media. Give examples for each category. (6 marks) b) Explain about LAN, WAN and MAN. (6 marks) c) What components are required for successful communications? (3 marks)

END OF QUESTION PAPER

Hak Cipta Universiti Teknologi MARA

CONFIDENTIAL

También podría gustarte